Search Results - (( basic elements selection algorithm ) OR ( java application during algorithm ))
Search alternatives:
- selection algorithm »
- application during »
- java application »
- during algorithm »
- basic elements »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…In the first phase, the ontology element and algorithm techniques should be selected. …”
Get full text
Get full text
Thesis -
3
Power line faults classification by neural network train by Ant Colony Optimization
Published 2017“…The characteristic of ACO algorithms is their explicit use of elements of previous solutions. …”
Get full text
Get full text
Student Project -
4
Shepherding: An Immune-Inspired Robotics Approach
Published 2010“…In this research, basic biological immune systems and their responses to external elements to maintain an organism’s health state are used as an inspiration for solving a specific multi-robot system problem. …”
Get full text
Get full text
Conference or Workshop Item -
5
Memory-based Immune Network for Multi-Robot Cooperation
Published 2009“…In this paper, basic biological immune systems and their responses to external elements to maintain an organism's health state are fully described. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Multi-Robot Cooperation using Immune Network with Memory
Published 2009“…In this paper, basic biological immune systems and their responses to external elements to maintain an organism's health state are described. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
-
10
A Refined Immune Systems Inspired Model for Multi-Robot Shepherding
Published 2010“…In this paper, basic biological immune systems and their responses to external elements to maintain an organism's health state are described. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Refined Immune Systems Inspired Model For Multi-robot Shepherding
Published 2010“…In this paper, basic biological immune systems and their responses to external elements to maintain an organism's health state are described. …”
Get full text
Get full text
Conference or Workshop Item -
12
Development of adaptive controlled natural gas transmission water bath heater using mathematical model / Amiruddin Amkaromi
Published 2018“…An adaptive set point regulation algorithm and the model reference are prepared to work with Proportional Integral Derivative (PID) controller in basic Labview programming platform. …”
Get full text
Get full text
Thesis -
13
-
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
